Skip to main content

Overview

XSDS security encompasses encryption at rest for stored data, cluster authentication between all services using cephx, network isolation to separate replication traffic from client-facing traffic, and regular key rotation procedures.
Administrator Access Required — This operation requires the admin role. Contact your Xloud administrator if you do not have sufficient permissions.
Prerequisites
  • Administrator credentials with the admin role
  • Access to XDeploy (https://connect.<your-domain>) for OSD deployment settings
  • SSH access to cluster management node for cephx key operations

Encryption at Rest

XSDS supports OSD-level encryption at rest using dm-crypt. All data written to an encrypted OSD is encrypted before it reaches the physical disk.
Encryption is configured at OSD deployment time through XDeploy.

Configure encryption before deployment

Navigate to XDeploy → Storage → OSD Deployment and enable Encrypt OSDs at deployment before provisioning new OSDs.Encryption keys are managed by the Xloud Key Management service and rotated on a configurable schedule.

Verify encryption on deployed OSDs

Check if OSD device is encrypted
ceph osd metadata <OSD_ID> | grep dmcrypt
Encrypted OSDs report "dmcrypt": true in their metadata.
OSD metadata confirms dm-crypt encryption is active.
Encryption cannot be enabled on existing OSDs without redeploying them. Plan encryption requirements before initial OSD deployment. In-place encryption of existing OSDs requires data migration to new encrypted OSDs.

Cluster Authentication (cephx)

All cluster communication uses cephx, the XSDS cluster authentication framework. Each service has its own key with minimum required capabilities.
List all cephx keys
ceph auth ls
View capabilities for a specific key
ceph auth get client.<NAME>
Standard key names:
  • client.admin — full administrative access
  • client.cinder — used by the block storage service
  • client.glance — used by the image service
  • client.nova — used by the compute service
  • client.rgw.<id> — used by object storage gateways

Network Isolation

Configure a dedicated cluster network for OSD replication traffic to isolate storage replication I/O from client-facing traffic.
NetworkPurposeTraffic
Public networkClient-to-OSD I/O, MON communication, RGW APIRead/write requests from Compute nodes
Cluster networkOSD-to-OSD replication, recovery, scrubbingInternal replication traffic

Next Steps

Encryption at Rest

Block storage volume-level encryption managed through the Key Management service

Xloud Key Management

Manage and rotate the encryption keys used by XSDS and other services

Cluster Management

Ongoing operational management for a secured cluster

Troubleshooting

Diagnose authentication and connectivity issues